Glossary www.linksysbycisco.com/glossary Network Security www.linksysbycisco.com/security Copyright and Trademarks Linksys, Cisco and the Cisco Logo are registered trademarks or trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries. Other brands and product names are trademarks or registered trademarks of their respective holders.
Product Overview is flashing, the Router is sending or receiving data over the network. Thank you for choosing the Linksys by Cisco Wireless-N Internet (Blue) The Internet LED lights up Home Router. The Router lets you access the Internet via...
Page 6
Product Overview Chapter 1 Wall-Mounting Placement The Router has two wall-mount slots on its bottom panel. The distance between the slots is 152 mm (6 inches). Two screws are needed to mount the Router. Suggested Mounting Hardware 4-5 mm 1-1.5 mm Note: Mounting hardware illustrations are not †...
Wireless Security Checklist Chapter 2 Chapter 2: 4. Enable encryption Wireless Security Checklist Encryption protects data transmitted over a wireless network. Wi-Fi Protected Access (WPA/WPA2) and Wired Wireless networks are convenient and easy to install, so Equivalent Privacy (WEP) offer different levels of security homes with high-speed Internet access are adopting them for wireless communication.
Advanced Configuration Chapter 3 Chapter 3: Advanced Configuration After setting up the Router with the Setup Wizard (located on the CD-ROM), the Router will be ready for use. However, if you want to change its advanced settings, use the Router’s browser-based utility. This chapter describes each web page of the utility and each page’s key functions.
Page 9
Advanced Configuration Chapter 3 Automatic Configuration - DHCP Service Name (Optional) If provided by your ISP, enter the Service Name. By default, the Router’s Internet Connection Type is set Connect on Demand: Max Idle Time You can configure to Automatic configuration - DHCP, which should be the Router to cut the Internet connection after it has been kept only if your ISP supports DHCP or you are connecting inactive for a specified period of time (Max Idle Time).
Page 10
Advanced Configuration Chapter 3 DNS 1-3 Your ISP will provide you with at least one Keep Alive: Redial Period If you select this option, • DNS (Domain Name System) server IP address. the Router will periodically check your Internet connection. If you are disconnected, then the Router PPTP Server IP Address Your ISP will provide you with will automatically re-establish your connection.
Page 11
Advanced Configuration Chapter 3 Host Name and Domain Name These fields allow you to DHCP Server DHCP is enabled by factory default. If you supply a host and domain name for the Router. Some ISPs, already have a DHCP server on your network, or you do usually cable ISPs, require these names as identification.
Advanced Configuration Chapter 3 addresses to. This number cannot be greater than 253. The features available on the DDNS screen will vary, The default is 50. depending on which DDNS service provider you use. IP Address Range Displayed here is the range of available DynDNS.org IP addresses.
Advanced Configuration Chapter 3 TZO.com Click Save Settings to apply your changes, or click Cancel Changes to clear your changes. Setup > Advanced Routing This screen is used to set up the Router’s advanced functions. Operating Mode allows you to select the type(s) of advanced functions you use.
Advanced Configuration Chapter 3 Route Entries To set up a static route between the Router as wireless adapters, that support Wi-Fi Protected Setup, and another network, select a number from the drop- then you can use Wi-Fi Protected Setup. down list. Click Delete This Entry to delete a static route. Configuration View To manually configure your wireless Enter Route Name...
Page 15
Advanced Configuration Chapter 3 Wireless-N channel. Select any channel from the drop- down menu. If you are not sure which channel to select, keep the default, Auto. Standard Channel If 20MHz only is the Channel Width setting, then select the appropriate channel for your wireless network.
Advanced Configuration Chapter 3 Method #3 WPA Personal Use this method if your client device asks for the Router’s NOTE: If you are using WPA, then each device in PIN number. your wireless network MUST use the same WPA 1. Enter the PIN number listed on this screen. (It is also method and shared key, or else the network will listed on the label on the bottom of the Router.) not function properly.
Page 17
Advanced Configuration Chapter 3 WPA Enterprise Shared Secret Enter the key shared between the Router and the server. This option features WPA used with a RADIUS server. (This Key Renewal Enter a Key Renewal period, which instructs should only be used when a RADIUS server is connected the Router how often it should change the encryption to the Router.) keys.
Advanced Configuration Chapter 3 Wireless > Wireless MAC Filter WEP is a basic encryption method, which is not as secure Wireless access can be filtered by using the MAC addresses of as WPA. the wireless devices transmitting within your network’s radius. IMPORTANT: If you are using WEP encryption, then each device in your wireless network MUST...
Advanced Configuration Chapter 3 Advanced Wireless AP Isolation This option isolates all wireless clients and wireless devices on your network from each other. Wireless devices will be able to communicate with the Router but not with each other. To use this option, select Enable. AP Isolation is disabled by default.
Advanced Configuration Chapter 3 Wireless-G devices are experiencing severe problems and are not able to transmit to the Router in an environment with heavy 802.11b traffic. This option boosts the Router’s ability to catch all Wireless-N and Wireless-G transmissions but severely decreases performance. To use this option, keep the default, Auto.
Advanced Configuration Chapter 3 Access Restrictions > Internet Access this option to enable Java filtering. This option is disabled by default. The Internet Access screen allows you to block or allow ActiveX ActiveX is a programming language for websites. specific kinds of Internet usage and traffic, such as Internet If you deny ActiveX, you run the risk of not having access to access, designated services, and websites during specific Internet sites created using this programming language.
Page 22
Advanced Configuration Chapter 3 Summary Status Policies are disabled by default. To enable a policy, select the policy number from the drop-down menu, and select Enabled. To create a policy, follow steps 1-11. Repeat these steps to Internet Access PC List create additional policies, one at a time.
Advanced Configuration Chapter 3 To delete a service, select it from the Application list. To IP Address For each application, enter the IP address Then click Delete. of the computer that should receive the requests. If you assigned a static IP address to the computer, then you 11.
Advanced Configuration Chapter 3 Start~End Port Enter the number or range of port(s) Forwarded Range For each application, enter the starting used by the server or Internet applications. Check and ending port numbers of the forwarded port number with the Internet application documentation for more range.
Advanced Configuration Chapter 3 by MAC address, select MAC Address and enter the MAC WMM Support If you have other devices that support address in the field provided. To retrieve this information, Wi-Fi Multimedia (WMM) on your network, keep the click DHCP Client Table.
Page 26
Advanced Configuration Chapter 3 MAC Address Port Range Enter the port range that the application will be using. For example, if you want to allocate bandwidth for FTP, you can enter 21-21. If you need services for an application that uses from 1000 to 1250, you enter 1000- 1250 as your settings.
Advanced Configuration Chapter 3 Local Management Access Priority This column displays the bandwidth priority of High, Medium, Normal, or Low. Access via HTTP (HyperText Transport Protocol) is the Name This column displays the application, device, or communications protocol used to connect to servers on port name.
Advanced Configuration Chapter 3 UPnP To use UPnP, keep the default, Enabled. Otherwise, select Disabled. Allow Users to Configure Keep the default, Enabled, if you want to be able to make manual changes to the Router while using the UPnP feature. Otherwise, select Disabled.
Advanced Configuration Chapter 3 Administration > Factory Defaults Diagnostics Ping Test Restore the Router to its factory default settings. Ping checks the status of a connection. IP or URL Address Enter the address of the computer whose connection you wish to test. Packet Size Enter the packet size you want to use.
Advanced Configuration Chapter 3 Firmware Upgrade Domain Name The Domain Name of the Router is displayed (if it was entered on the Setup > Basic Setup Before upgrading the firmware, download the Router’s screen). firmware upgrade file from the Linksys website, Internet Connection www.linksysbycisco.com.
Advanced Configuration Chapter 3 Security The wireless security method used by the Router is displayed. SSID Broadcast The status of the SSID Broadcast feature is displayed. DHCP Clients Table DHCP Client Table The DHCP Client Table lists computers and other devices that have been assigned IP addresses by the Router.
Troubleshooting Appendix A Appendix A: 4. Click OK. The Router does not have a coaxial port for the cable Troubleshooting connection. The Router does not replace your modem. You still need Your computer cannot connect to the Internet. your cable modem in order to use the Router. Connect your cable connection to the cable modem, and then Follow these instructions until your computer can connect insert the setup CD into your computer.
Warranty Information Appendix C Appendix C: not warrant that the operation of the product or software will be uninterrupted or error free. Also, due to the Warranty Information continual development of new techniques for intruding upon and attacking networks, Linksys does not warrant that the product, software or any equipment, system or Limited Warranty network on which the product or software is used will be...
Page 35
Warranty Information Appendix C DATED PROOF OF ORIGINAL PURCHASE IS REQUIRED TO PROCESS WARRANTY CLAIMS. If you are requested to return your product, you will be given a Return Materials Authorization (RMA) number. You are responsible for properly packaging and shipping your product to Linksys at your cost and risk.